Javier LUIS, Plaintiff-Appellant, v. Joseph ZANG et al., Defendants, Awareness Technologies, Defendant-Appellee.
No. 14-3601
United States Court of Appeals, Sixth Circuit.
Argued: April 27, 2016; Decided and Filed: August 16, 2016
Rehearing En Banc Denied September 16, 2016 *
833 F.3d 619
* Judge Sutton recused himself from participation in this ruling. Judge Batchelder would grant rehearing for the reasons stated in her dissent.
In Abela v. Martin, this court observed that “[a] statute of limitations should be clear” such that, “[a]t any given point, courts and litigants should be able to determine whether the limitations period has begun, is running, is tolled, or has expired[.]” 348 F.3d 164, 172 (6th Cir. 2003) (en banc). Though that opinion has been called into question on other grounds,3 Abela‘s explanation of the policy interest undergirding its decision—that “whether a limitations period is running should not depend on events that happen only at a later date,” id. remains applicable and was subsequently affirmed by Gonzalez when the Supreme Court refused to retroactively adjust AEDPA tolling based on whether or not the petitioner appealed, Gonzalez, 132 S.Ct. at 653-54.
Reversing the district court‘s order in this case promotes finality in State court review and clarity in subsequent federal habeas actions without jeopardizing AEDPA‘s additional goals of comity and federalism. See Williams v. Taylor, 529 U.S. 420, 436, 120 S.Ct. 1479, 146 L.Ed.2d 435 (2000). Our present holding does not require us to take up the question of whether the Michigan Supreme Court erred in dismissing Holbrook‘s post-conviction motion as untimely. See Vroman v. Brigano, 346 F.3d 598, 604 (6th Cir. 2003) (“This court . . . does not function as an additional state appellate court reviewing state court decisions on state law or procedure.“). Instead, we interpret the term “pending” as used in a federal statute by relying on controlling precedent from the Supreme Court and this circuit. Based on these authorities, we hold that Holbrook‘s federal habeas petition was timely filed because AEDPA‘s one-year statute of limitations was tolled during the period in which he could have, but did not, appeal the Michigan Court of Appeals’ denial of his motion for post-conviction relief.
CONCLUSION
For these reasons, we REVERSE the order of the district court and REMAND the case for further proceedings consistent with this opinion.
Before: MERRITT, BATCHELDER, and GILMAN, Circuit Judges.
GILMAN, J., delivered the opinion of the court in which MERRITT, J., joined. BATCHELDER, J. (pp. 644-46), delivered a separate dissenting opinion.
OPINION
RONALD LEE GILMAN, Circuit Judge.
Javier Luis, a resident of Florida, developed an online personal relationship with Ohio resident Catherine Zang. The relationship was apparently platonic, but Catherine‘s husband, Joseph Zang, was nonetheless suspicious of his wife‘s online activities. This caused Joseph to secretly install a product known as WebWatcher on the computer used by Catherine in order to monitor her communications. According to Luis, WebWatcher and its manufacturer, Awareness Technologies, Inc., surreptitiously intercepted the emails, instant messages, and other communications that were sent between Luis and Catherine. Awareness then allegedly disclosed the communications to Joseph, who used them as leverage to divorce Catherine on favorable terms.
Upset by the capture and disclosure of his otherwise private communications, Luis filed suit against Joseph Zang, Awareness, and several others. He eventually settled his claims against all the defendants other than Awareness. With respect to Awareness, Luis alleged that the involvement of its WebWatcher “spyware” in secretly recording the communications at issue violated the federal Wiretap Act, the Ohio Wiretap Act, and Ohio common law. The district court concluded that Luis had failed to state a cause of action against Awareness, leading to the present appeal. Because the district court‘s dismissal failed to take into account the extent to which Awareness itself was allegedly engaged in the asserted violations, we REVERSE the judgment of the district court and REMAND the case for further proceedings consistent with this opinion.
I. BACKGROUND
A. Factual background
This case is on appeal from the district court‘s order granting Awareness‘s motion to dismiss for failure to state a claim under
In early 2009, Luis made contact with Catherine Zang while participating in an online “Metaphysics” chatroom hosted by America Online. Catherine at the time was married to Joseph Zang, but the marriage was not a happy one. This resulted in Luis reaching out to Catherine and “devel-op[ing] a caring relationship with her.” The two never met in person, but they had “daily communications” that were sent via the internet between Luis‘s home in Flori
Joseph suspected that Catherine was communicating with other men and decided to take steps to monitor Catherine‘s actions. He accordingly installed a software program known as “WebWatcher” on the computer used by Catherine. According to Luis‘s complaint, this program intercepts electronic communications such as emails and instant messages in real time as the communications are sent. The program then contemporaneously forwards the intercepted communications to servers maintained by Awareness in California, where the communications are stored for later review. A WebWatcher user such as Joseph may then access the servers and peruse copies of the communications at issue at any time after the communications are intercepted and stored.
Joseph allegedly installed WebWatcher on the computer used by Catherine sometime in early 2009, and he used the program to intercept emails and instant messages sent between Luis and Catherine for several months thereafter. He then used these communications as leverage to help his attorney secure favorable terms for a divorce from Catherine in 2010.
WebWatcher is manufactured and marketed by Awareness. The program allegedly “records all PC activity including emails, IMs, websites visited, web searches, Facebook/MySpace activity, and anything typed in real time.” According to Awareness‘s advertisements, the WebWatcher program creates and stores a record of whatever is sent to or from the computer in question. The process occurs in “near real-time, even while [a] person is still using the computer.” This means that even if a computer user deliberately deletes or fails to save a communication, the WebWatcher program will record and save it for later retrieval from servers owned and maintained by Awareness.
The process also allows a WebWatcher user to access the communications from any location with an internet connection. Intercepted communications, in other words, are stored in and made available to the user from Awareness‘s servers, so a WebWatcher user can access the intercepted communications without physically accessing the computers that were used to send or receive those communications.
In addition, Awareness provides a service known as “Alert Word.” This software program scans the captured communications and monitors them for certain keywords that may be of interest to the WebWatcher user. The program then takes screenshots of the relevant communications and highlights them so that the WebWatcher user can view the communications without sorting through material deemed irrelevant to the user.
According to Luis‘s complaint, Awareness markets the WebWatcher program as a means for suspicious spouses to illegally monitor their partners’ communications without their partners’ knowledge or consent. Luis specifically alleges that Awareness “intentionally targets their product at spouses in their marketing campaigns—enticing them with the lure of finding out everything that goes on in the targeted computer‘s private accounts.” (Emphasis in original.) This marketing strategy allegedly goes “far beyond” any ostensibly legitimate purpose (such as monitoring a child‘s use of the Internet) that WebWatcher might otherwise have. Moreover, the marketing is allegedly similar to other companies’ marketing strategies that the Federal Trade Commission has in the past condemned as encouraging illegal spying. Luis thus contends that Awareness “knew or should have known” that purchasers of WebWatcher “would use it for illegal purposes.”
B. Procedural background
Luis became aware of Joseph‘s use of WebWatcher in the summer of 2010. He thereafter sued Awareness, Joseph, and several other defendants in the United
As relevant to the current appeal, the complaint asserts three causes of action against Awareness. It first alleges that Awareness intentionally intercepted Luis‘s electronic communications, in violation of
Awareness moved to dismiss Luis‘s complaint under
A magistrate judge was directed to prepare a Report and Recommendation (R&R) evaluating Awareness‘s arguments. The R&R concluded that Luis‘s communications had in fact been “intercepted” as that term is used in the federal Wiretap Act, but the magistrate judge nonetheless recommended that Luis‘s claims be dismissed. With respect to the claimed violation of
The district court adopted the R&R in June 2014 and subsequently dismissed all claims against Awareness. Luis now appeals, arguing that he has adequately pleaded all three of the claims described above.
II. ANALYSIS
A. Standard of review
We review de novo the district court‘s decision to dismiss Luis‘s complaint under
In evaluating a motion to dismiss, we “may consider the complaint and any exhibits attached thereto, public records, items appearing in the record of the case and exhibits attached to defendant‘s motion to dismiss so long as they are referred to in the complaint and are central to the claims contained therein.” Id. (alterations and internal quotation marks omitted). We must accept the complaint‘s well-pleaded factual allegations as true, construe the complaint in the light most favorable to the plaintiff, and draw all reasonable inferences in the plaintiff‘s favor. Bassett v. Nat‘l Collegiate Athletic Ass‘n, 528 F.3d 426, 430 (6th Cir. 2008).
Moreover, Luis was acting pro se when he filed the relevant complaint in this case. We hold such pro se pleadings “to less stringent standards than formal pleadings drafted by lawyers.” Williams v. Curtin, 631 F.3d 380, 383 (6th Cir. 2011) (internal quotation marks omitted). Luis‘s pleadings should therefore be “liberally construed.” See id.
B. Luis sufficiently alleged facts supporting a cause of action against Awareness for illegal interception of an electronic communication, in violation of 18 U.S.C. § 2511
Luis‘s first claim is that Awareness violated
(1) Except as otherwise specifically provided in this chapter[,] any person who—(a) intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication . . . shall be punished [by a fine or by imprisonment.]
(a) In general.—Except as provided in section 2511(2)(a)(ii), any person whose wire, oral, or electronic communication is intercepted, disclosed, or intentionally used in violation of this chapter may in a civil action recover from the person or entity, other than the United States, which engaged in that violation such relief as may be appropriate.
Luis‘s first claim thus divides into two parts: one is the allegation that Awareness violated
But Awareness does contest the first part of Luis‘s claim. It maintains that his claim falters because WebWatcher does not “intercept” electronic communications. Awareness asserts that the term “intercept” applies only to situations in which a device captures a communication “either before [the communication] reaches the intended recipient or contemporaneous with the transmission[,] but not after it reaches the destination where it is placed in electronic storage.” It contends that WebWatcher does not satisfy this contemporaneity requirement because the device
1. The term “intercept” as used in 18 U.S.C. § 2511 requires that an acquisition of a communication occur contemporaneously with the transmission of the communication
An “intercept” for purposes of the Wiretap Act is defined as “the aural or other acquisition of the contents of any wire, electronic, or oral communication through the use of any electronic, mechanical, or other device.”
The Fifth Circuit explained the basis for this requirement in Steve Jackson Games, Inc. v. U.S. Secret Service, 36 F.3d 457 (5th Cir. 1994). In that case, the court observed that the Wiretap Act originally applied only to wire communications and oral communications. Id. at 461. Congress then passed the Electronic Communications Privacy Act (ECPA) in 1986, in which the Wiretap Act was amended to cover “electronic communications.” Id.
In doing so, Congress drew a distinction between “electronic communications” and “electronic storage.” Id. The former term is defined as “any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or photooptical system.”
The term “intercept,” as noted above, applies only to electronic communications, not to electronic storage. See
This gives rise to the contemporaneity requirement. Once the transmission of the communication has ended, the communication ceases to be a communication at all. The former communication instead becomes part of “electronic storage.” And at that point a person cannot “intercept” the former communication because the term intercept, as noted above, does not apply to electronic storage. Interception must thus occur contemporaneously with the transmission of the communication; it must, in other words, catch the communi
This distinction between electronic communications and electronic storage is not an accident of statutory drafting. When Congress enacted the ECPA, it specifically differentiated between communications in transit and communications in storage. In particular, Title I of the ECPA prohibits intentionally intercepting electronic communications, whereas Title II of the ECPA prohibits gaining unauthorized access to stored communications. See Steve Jackson Games, 36 F.3d at 459. Title I, moreover, imposes certain procedural requirements on law-enforcement officers who wish to investigate crimes by intercepting electronic communications, whereas Title II implements different procedural requirements for law-enforcement officers who wish to investigate crimes by accessing electronic storage. Id. at 463. Finally, Title I limits the types of crimes that can be investigated through the monitoring of electronic communications, but Title II contains no such limit on the types of crimes that can be investigated through access to stored communications. Id.
These distinctions between Title I and Title II of the ECPA show that Congress clearly meant to differentiate between communications and storage. The contemporaneity requirement thus plays a crucial role in effectuating congressional intent. If the communication is acquired contemporaneously with its transmission, then an “intercept” has occurred and Title I applies; in contrast, if the communication is not acquired contemporaneously with its transmission, then “storage” has been accessed and Title II applies. So even though the definition of “intercept” does not explicitly require that an acquisition be contemporaneous with transmission, see
All of the circuit courts that have considered the issue have therefore followed Steve Jackson Games and have concluded, like the Fifth Circuit, that the acquisition of a communication must be contemporaneous with its transmission in order for an “intercept” to occur. See Fraser v. Nationwide Mut. Ins. Co., 352 F.3d 107, 113 (3d Cir. 2003), as amended (Jan. 20, 2004) (“Nationwide argues that it did not ‘intercept’ Fraser‘s e-mail within the meaning of Title I because an ‘intercept’ can only occur contemporaneously with transmission . . . [W]e agree with Nationwide.“); United States v. Steiger, 318 F.3d 1039, 1048-49 (11th Cir. 2003) (“The Fifth and Ninth Circuits’ reasoning is persuasive and we hold that a contemporaneous interception—i.e., an acquisition during ‘flight‘—is required to implicate the Wiretap Act with respect to electronic communications.“); Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 878 (9th Cir. 2002) (“We therefore hold that for a website to be ‘intercepted’ in violation of the Wiretap Act, it must be acquired during transmission, not while it is in electronic storage.“). But see United States v. Councilman, 418 F.3d 67, 79-80 (1st Cir. 2005) (casting doubt on the contemporaneity requirement, but ultimately concluding that the
District courts in the Sixth Circuit have also adopted the contemporaneity requirement. See, e.g., Garback v. Lossing, No. 09-CV-12407, 2010 WL 3733971, at *2 (E.D. Mich. Sept. 20, 2010) (“[Courts] agree that the term intercept encompasses only acquisitions contemporaneous with transmission. . . . [T]he Court finds this reasoning persuasive and adopts it here.” (emphasis and internal quotation marks omitted)); Cardinal Health 414, Inc. v. Adams, 582 F.Supp.2d 967, 979-80 (M.D. Tenn. 2008) (“The Third, Fifth, Ninth, and Eleventh Circuits all agree that, for a communication to be ‘intercepted’ under the [Wiretap Act], that communication must be acquired during the ‘flight’ of the communication. . . . The reasoning from the multiple circuit courts discussed above is sound. . . .“).
Our court has not yet decided precisely when an “intercept” occurs under the Wiretap Act. In light of the above discussion, however, we conclude that the contemporaneity requirement is both (1) consistent with the structure of the ECPA, and (2) consistent with the interpretation of the Act adopted by every circuit to have ruled on the issue. We therefore hold that, in order for an “intercept” to occur for purposes of the Wiretap Act, the electronic communication at issue must be acquired contemporaneously with the transmission of that communication.
2. Luis‘s complaint sufficiently alleges that Awareness (via WebWatcher) acquires communications in a manner that is contemporaneous with their transmission
For the reasons explained above, Luis‘s claim that Awareness intercepted his electronic communications requires him to establish that Awareness acquired those communications contemporaneously with their transmission. Luis‘s complaint must therefore allege facts that, when accepted as true, give rise to a reasonable inference that Awareness contemporaneously acquired the communications. See Ashcroft v. Iqbal, 556 U.S. 662, 678, 129 S.Ct. 1937, 173 L.Ed.2d 868 (2009). Awareness argues that Luis‘s complaint fails to do so because (1) the complaint contains no specific allegations that WebWatcher contemporaneously captures communications, and (2) even if there are such allegations, those allegations are belied by an affidavit submitted by Awareness‘s Chief Executive Officer (CEO). Neither contention has merit.
a. Allegations of contemporaneous acquisition
In support of his illegal-intercept claim, Luis attached to his complaint various marketing materials that describe the features of a product called WebWatcher. As noted above, we may appropriately take account of such attachments. See Kreipke v. Wayne State Univ., 807 F.3d 768, 774 (6th Cir. 2015) (“In reviewing a motion to dismiss, the Court may consider the complaint and any exhibits attached thereto. . . .” (alteration and internal quotation marks omitted)). Awareness, however, argues that the marketing materials in this case cannot be considered because they do not identify the source of the product. As stated by Awareness, the complaint contains “no allegation that they concern the product” that Joseph allegedly installed on the computer used by Catherine. It adds that “Luis uses [the] unverified marketing materials to form the basis of his Wiretap Act claims yet never makes the specific allegation that these marketing materials have any connection to the product used by Joseph C. Zang.” Awareness therefore asks us to ignore these materials, maintaining that, in their absence,
We are not persuaded. Luis‘s complaint (1) specifically alleges that Awareness intercepted his communications using an electronic device called WebWatcher, (2) includes as attachments various marketing materials that describe the features of an electronic device unequivocally called WebWatcher, and (3) specifically refers to those marketing materials when describing the way in which Awareness‘s device operates. Thus, regardless of whether the complaint includes a specific allegation that the attached marketing materials refer to the same device identified in the body of the complaint, the only “reasonable inference” under these circumstances, see Iqbal, 556 U.S. at 678, 129 S.Ct. 1937, is that they do.
Awareness is of course correct that some possibility exists that the marketing materials might refer to another device carrying the trademark “WebWatcher” that is unaffiliated with Awareness‘s own WebWatcher. This argument, however, is far-fetched at best, and the more “plausible inference,” see id. at 682, 129 S.Ct. 1937, is that the materials do in fact apply to Awareness‘s WebWatcher that Joseph allegedly used. These materials thus help illuminate the way in which WebWatcher allegedly intercepted Luis‘s communications.
In addition, Luis at this point in the litigation need push his claim past only the “speculative level.” See Bell Atl. Corp. v. Twombly, 550 U.S. 544, 555, 127 S.Ct. 1955, 167 L.Ed.2d 929 (2007) (“Factual allegations must be enough to raise a right to relief above the speculative level. . . .“). Hence, even if there exists some minimal doubt about the relationship between Awareness‘s WebWatcher and the WebWatcher marketing materials attached to the complaint, that doubt, standing alone, is not enough to ignore the materials. This is especially true because we must liberally construe Luis‘s pro se complaint, see Williams v. Curtin, 631 F.3d 380, 383 (6th Cir. 2011), with the result that we will grant Luis the benefit of any doubt and conclude that, for the purposes of the current appeal, the marketing materials do in fact apply to the WebWatcher at issue.
We next consider whether the marketing materials and Luis‘s accompanying allegations contain factual content sufficient to support a reasonable inference that Awareness, via WebWatcher, acquired Luis‘s electronic communications contemporaneously with their transmission. Two allegations in the complaint support this inference. First, Luis alleges that the communications at issue “were not originally stored on the computer‘s hard drive.” The communications were instead acquired by Awareness “as [they were] being written and communicated between senders and recipients.” This allegation directly supports the proposition that the communications were still “in flight” for the purposes of
Second, Luis alleges that “WebWatcher immediately and instantaneously rout[e]s the intercepted communications to their [i.e., Awareness‘s] servers located in California.” (Emphasis in original.) This allegation directly supports an inference of contemporaneous interception because, if WebWatcher does in fact “immediately and instantaneously” copy and send com
The marketing materials attached to Luis‘s complaint support this conclusion. As Luis notes, the materials state that WebWatcher lets its users review a person‘s electronic communications “in near real-time, even while the person is still using the computer.” The materials further note that any deviation from real-time monitoring results not from delays regarding when the communications are acquired, but from variations in “the Internet connection speed of the computer being monitored.”
This near real-time monitoring is significant. If a WebWatcher user can in fact review another person‘s communications in near real time, then WebWatcher must be acquiring the communications and transferring them to Awareness‘s servers as soon as the communications are sent. The program, in other words, does not wait for the communications to be stored; instead, the program as described captures and reroutes the communications so that a WebWatcher user can review the communications at nearly the same time as they are being transmitted.
In addition, the marketing materials state that “[e]ven if a document is never even saved, WebWatcher still records it.” This feature indicates that WebWatcher does not wait for electronic communications to be saved in a computer‘s electronic storage. Rather, the product records the communications as they are being sent, without regard for whether a copy is ever placed in the storage of the affected computer. This aspect of WebWatcher‘s operations thus implies that the alleged acquisition of Luis‘s communications indeed occurred while the communications were still “in flight.” See Szymuszkiewicz, 622 F.3d at 704. And this allegation, in connection with the other allegations described above, supports a reasonable inference that Luis‘s communications were in fact “intercepted” under
Nor do other allegations in the complaint undermine this conclusion. At oral argument, an issue was raised about the effect of the complaint‘s later reference to “oral” communications. Paragraph 98 of the complaint, for instance, states that “Defendants, and each of them,” violated the Wiretap Act because they “intentionally intercepted . . . oral communication[s],” or “intentionally disclosed . . . oral communication[s],” or “intentionally used . . . the contents of oral communication[s].” These allegations regarding oral communications, the argument goes, are inconsistent with Luis‘s basic claim that his electronic communications—such as emails and instant messages—were intercepted by Awareness, with the result that Luis‘s claims purportedly do not state a plausible basis for relief.
We respectfully disagree. Although Paragraph 98 does refer to oral communications, that paragraph also “restates and re-alleges the allegations set forth” in the complaint‘s preceding paragraphs. And in those paragraphs, Luis specifically alleges that the “listed defendants . . . violated the federal wiretap law . . . when electronic communications originating from Plaintiff‘s computer located in Florida[] were intercepted in transmission using WebWatcher.” (Emphasis added.) Luis then adds that the electronic communications
b. The affidavit from Awareness‘s CEO
Awareness resists the above conclusion that an intercept occurred by relying on an affidavit submitted by its CEO, Brad Miller. This affidavit was executed in August 2012 and is attached to Awareness‘s motion to dismiss. Miller states in the affidavit that, after being installed on a computer, WebWatcher “records various activities . . . such as e-mails sent and received, websites visited, keystrokes typed and transcripts of online chats.” This recorded content is then “sent to an online account,” from which a WebWatcher user may access the material at a later date. According to Miller, a WebWatcher user “cannot view communications at the time a communication is transmitted.”
This purported lack of real-time monitoring is important, Awareness maintains, because it allegedly shows that any acquisition of communications is not contemporaneous with the communications’ transmission. Awareness thus urges that Miller‘s affidavit be read as firmly establishing that no contemporaneous acquisition—and hence no intercept—occurred in this case.
This argument is unpersuasive for two reasons, the first procedural and the second substantive. Procedurally, Awareness is not entitled to rely on affidavits at this stage of the case. A court evaluating a motion to dismiss may, as noted above, consider “the complaint and any exhibits attached thereto, public records, items appearing in the record of the case and exhibits attached to defendant‘s motion to dismiss so long as they are referred to in the complaint and are central to the claims contained therein.” Kreipke v. Wayne State Univ., 807 F.3d 768, 774 (6th Cir. 2015) (alterations and internal quotation marks omitted). Miller‘s affidavit, although attached to Awareness‘s motion to dismiss, is plainly not “referred to in the complaint.” The affidavit therefore does not fall within the categories of documents that may be considered at this point in the litigation. See id.
Moreover, even if we were to consider Miller‘s affidavit, the substance of Aware
And even if Miller is correct that a WebWatcher user “cannot view communications at the time a communication is transmitted,” that assertion does not necessarily undermine Luis‘s allegations. Luis claims that Awareness itself illegally intercepted his communications, and he specifically alleges that Awareness—through WebWatcher—“immediately and instantaneously rout[e]s the intercepted communications to their servers located in California.” (Emphasis in original.) Hence, even if a WebWatcher user cannot obtain real-time access to the communications, the possibility remains that Awareness itself acquires the communications while they are still in transit. Any potential delay in access to the communications for a WebWatcher user therefore does not preclude a finding that Awareness itself acquires the communications in a manner contemporaneous with their transmission.
For the above reasons, neither Awareness‘s arguments about the complaint‘s allegations nor its reliance on its CEO‘s affidavit is persuasive. We therefore reject Awareness‘s assertions with respect to Luis‘s claim under
3. The district court‘s erroneous conclusion
In ruling on Awareness‘s motion to dismiss, the district court largely agreed with the above analysis and concluded that Luis‘s communications had been intercepted. The court nonetheless granted Awareness‘s motion to dismiss Luis‘s
Where the district court erred was in failing to recognize that Luis alleges not only that Awareness manufactures and sells WebWatcher, but that, once installed on a computer, WebWatcher automatically acquires and transmits communications to servers that Awareness owns and maintains. The alleged intercept of a communication thus occurs at the point where WebWatcher—without any active input from the user—captures the communication and reroutes it to Awareness‘s own servers. Construing these allegations liberally, as we must under Williams v. Curtin, 631 F.3d 380, 383 (6th Cir. 2011), the complaint supports an inference that Awareness itself—not simply the WebWatcher user—“acquires” the communications by rerouting them to servers that it owns and controls. That, in turn, suggests that Awareness itself is responsible for the alleged intercept. See
And that gives rise to a plausible claim for relief. This is because Awareness, as noted above, does not contest the proposition that if Awareness itself is deemed to have violated
The dissent disputes our conclusion on the ground that Luis “simply does not allege that Awareness was the one intentionally doing the intercepting.” Dissenting Op. 643. Its grammatical basis for this critique stems from the statement in the complaint that “WebWatcher . . . routs the intercepted communications to their servers” to be stored and analyzed for “their subscribers.” Id. at 644. The dissent concludes that there is no plausible connection between Awareness and the subject of the pronoun “their.” See id.
To the contrary, paragraphs 12 and 96 of the complaint specifically allege that Awareness (1) manufactures WebWatcher, (2) conducts “all marketing” for WebWatcher, and (3) is the “parent company” of WebWatcher. Hence, when Luis alleges that “WebWatcher . . . routs the intercepted communications” to “their” servers for “their” subscribers, the most plausible inference is that the word “their” applies to both WebWatcher and Awareness. Such a “plausible inference” is all that is required to survive a motion to dismiss, see Iqbal, 556 U.S. at 682, 129 S.Ct. 1937, so the dissent‘s argument does not persuade us that Luis‘s complaint is deficient.
C. Luis sufficiently alleged facts supporting a cause of action against Awareness for manufacturing, marketing, selling, and operating a wiretapping device in violation of 18 U.S.C. § 2512(1)(b)
The second claim that Luis pursues on appeal is that Awareness violated
Except as otherwise specifically provided in this chapter, any person who intentionally . . . (b) manufactures, assembles, possesses, or sells any electronic, mechanical, or other device, knowing or having reason to know that the design of such device renders it primarily useful for the purpose of the surreptitious interception of wire, oral, or electronic communications . . . shall be fined under this title or imprisoned not more than five years, or both.
Luis‘s complaint plainly alleges facts that support a reasonable inference that Awareness violated this section. First, Luis claims that Awareness is the manufacturer of WebWatcher, a device specifically designed to surreptitiously “intercept[] communications” such as those that were electronically transmitted between Luis and Catherine. Second, Luis claims that Awareness markets WebWatcher as a means for one spouse to illegally monitor the communications of another spouse in a way that goes “far beyond” any legitimate purpose that WebWatcher might have. These allegations easily support an inference that Awareness manufactures a device “knowing or having reason to know” that the device is “primarily useful for . . . the surreptitious interception of . . . electronic communications.” The complaint therefore adequately alleges a violation of
This leads to the question whether Luis can sue for that violation. Section 2512(1)(b) itself does not allow for such a suit because it provides only that the violator will be “fined . . . or imprisoned.” Luis‘s private cause of action for such a
Section 2520, as noted previously, states that “any person whose wire, oral, or electronic communication is intercepted, disclosed, or intentionally used in violation of [the Wiretap Act] may in a civil action recover from the person or entity . . . which engaged in that violation such relief as may be appropriate.” For the reasons explained earlier, Luis has adequately alleged facts supporting an inference that he is a “person whose . . . electronic communication [was] intercepted . . . in violation” of the Wiretap Act. See Part II.B. above. Luis is accordingly entitled to recover from the “person or entity . . . which engaged in that violation.” The sole question in assessing Luis‘s
Awareness argues that manufacturing an electronic device does not amount to such engagement within the meaning of
Luis counters that Awareness‘s interpretation ignores the plain language of the statute. If Congress had meant to restrict liability to only those persons or entities who make the specific decision to “intercept, disclose, or intentionally use” a communication, then Congress would have used those terms in defining the class of defendants subject to suit under
Courts that have previously addressed these arguments have come to inconsistent conclusions. On the one hand, a number of district courts have adopted a broad reading of
On the other hand, two of our sister circuits have disagreed with the conclusion reached by cases such as Dougherty and Kitzmiller. These circuits hold that
These conflicting arguments have generated divergent results in the context of private suits alleging that a defendant violated
In contrast, those courts that adopt a more limited reading of the “engaged in” language hold that simple possession is not enough to support a private cause of action for a violation of
We conclude that the Eleventh Circuit and those other courts that have adopted a narrow reading of
Our narrow reading of
The present case, in contrast, involves much more than simple possession. Instead, as described above, Awareness allegedly manufactured, marketed, and sold WebWatcher with knowledge that it would be primarily used to illegally intercept electronic communications. It then remained actively involved in the operation of WebWatcher by maintaining the servers on which the intercepted communications were later stored for WebWatcher‘s users. Awareness thus allegedly took a much more active role in causing the Wiretap Act violation in this case than the defendants in other cases who did nothing more than possess a wiretapping device in contravention of
We accordingly emphasize that our narrow holding is consistent with the conclusion that
So even though Awareness itself did not initiate the specific action that “intercepted, disclosed, or intentionally used” Luis‘s communications in violation of the Wiretap Act, it is alleged to have actively manufactured, marketed, sold, and operated the device that was used to do so. This is enough to establish that Awareness was “engaged in” a violation of the Wiretap Act in a way that defendants such as those in Treworgy and Amato—who simply possessed wiretapping devices—were not. See DirecTV, Inc. v. Tasche, 316 F.Supp.2d 783, 790 (E.D. Wis. 2004) (“Though Tasche may not have actually done the intercepting himself, it would be a stretch to find that he was not ‘engaged in’ that act. Those who sell devices that are designed to steal DirecTV‘s satellite transmissions to those who are intent on stealing DirecTV‘s satellite transmissions are, in my view, ‘engaged in’ intercepting such transmissions.“).
The dissent disputes the outcome that we reach on this issue, contending that civil liability under
In Peavy, the plaintiffs sought to pursue a civil action for an alleged violation of
On appeal, the Fifth Circuit considered whether
Any person whose wire or oral communication is intercepted, disclosed, or used in violation of this chapter shall (1) have a civil cause of action against any person who intercepts, discloses, or uses, or procures any other person to intercept, disclose, or use such communications, and (2) be entitled to recover from any such person [damages, attorney‘s fees, and costs].
[A]ny person whose wire, oral, or electronic communication is intercepted, disclosed, or intentionally used in violation of this chapter may in a civil action recover from the person or entity . . . which engaged in that violation such relief as may be appropriate.
The Fifth Circuit found the difference between the two versions of the statute significant. It noted that the 1986 amendment specifically deleted the reference to “procuring” the intercept of an electronic communication, with the implication that Congress—by making that deletion—intended to foreclose civil liability for such conduct. 221 F.3d at 169 (reading the 1986 amendment as a sign that Congress meant “to take away a civil action for procurement“).
The civil action in the current case rests on a different statutory footing. Luis argues—and we conclude—that his complaint adequately alleges that Awareness “engaged in” a violation of the Wiretap Act. As opposed to the “procurement” language at issue in Peavy, the “engaged in” language was not deleted from the earlier version of
Flowers is likewise distinguishable. In that case, as in Peavy, the court considered the pre-1986 version of
Luis‘s claim, in contrast, is not limited to “the mere selling” of the device at issue. Rather, Luis claims that Awareness manufactured, marketed, sold, and actively operated the violative device, all while knowing that its device was to be used primarily for the surreptitious interception of electronic communications. Awareness‘s alleged conduct in this case, in other words, is far more culpable than the defendant‘s alleged conduct in Flowers, with the result that Flowers sheds little light on whether Luis has stated a claim under
The dissent next asserts that our analysis “confuses Awareness‘s alleged violations of
First, Luis alleges that Awareness violated
Finally, the dissent asserts that our reading of the statute interjects unwarranted “indeterminacy” into the evaluation of private suits for claimed violations of
As the dissent observes, Dissenting Op. 645, this standard may in some cases raise factual questions about whether a defendant‘s role in operating a wiretapping device is extensive enough to constitute “en
D. Luis sufficiently alleged facts supporting his causes of action under the Ohio Wiretap Act and Ohio common law
In addition to his federal claims under the Wiretap Act, Luis‘s complaint contains a number of claims brought under Ohio state law. The district court dismissed all of his state-law claims. On appeal, Luis raises only two of them: (1) the alleged violations of the Ohio Wiretap Act, and (2) the tortious invasion of his privacy.
1. Luis sufficiently pleaded a cause of action under Ohio Rev. Code Ann. § 2933.52
Luis argues that his complaint states a claim under two different subsection of the Ohio Wiretap Act:
a. Purposeful intercept under § 2933.52(A)(1)
As Luis notes,
Consistent with its rulings on Luis‘s federal claims, the district court held that the Ohio Wiretap Act “does not contemplate imposing civil liability on software manufacturers and distributers for the activities of third parties.” The court thus concluded that Awareness could not be held liable for Joseph‘s actions in installing and using WebWatcher.
This reasoning is erroneous because Luis does not allege that Awareness is liable solely on the basis of Joseph‘s actions. Luis instead alleges that Awareness itself violated the Act in question. In particular, Luis‘s instant messages, emails, and other electronic communications were allegedly forwarded to Awareness‘s own servers in California. The messages were then allegedly (1) stored for later disclosure to Joseph, and (2) subjected to Awareness‘s “Alert Word” filtering system. Based on these allegations, Awareness itself “acquir[ed] . . . the contents of [Luis‘s] electronic communications” and thus “intercepted” the communications
b. Unauthorized use of the contents of an electronic communication under § 2933.52(A)(3)
Luis‘s second theory of liability under the Ohio Wiretap Act is that Awareness illegally “used” the contents of his electronic communications. This theory has three requirements. Luis must first allege that Awareness “used” an intercepted communication as that term has been defined for the purposes of
Luis alleges that Awareness “used” his communications when Awareness stored them on its servers in California and then disclosed them to Joseph for his later review. Ohio has treated the disclosure of an intercepted communication as conduct that satisfies the “use” requirement for the purposes of the Ohio Wiretap Act. See Nix, 160 F.3d at 348 (“In 1996, Ohio replaced section 2933.52(A)(3)‘s prohibition on ‘disclosure’ with a prohibition on ‘use,’ but . . . the district court and all parties have consistently interpreted
Next, Luis sufficiently alleged that Awareness itself violated the Ohio Wiretap Act by intercepting his communications within the meaning of
Finally, Luis‘s complaint alleges that Awareness markets WebWatcher with the expectation that purchasers will use the program for surreptitiously monitoring the communications of other persons. He claims in particular that Awareness “intentionally targets [its] product at spouses in [its] marketing campaigns—enticing them with the lure of finding out everything that goes on in the targeted computer‘s private accounts.” (Emphasis in original.) This marketing, Luis alleges, goes “far beyond” any legal uses that the product might have and is reminiscent of advertising strategies that the Federal Trade Commission has previously condemned as encouraging illegal spying.
Assuming that these allegations accurately describe Awareness‘s marketing efforts—as we must at this point in the litigation, see Boland v. Holder, 682 F.3d 531, 534 (6th Cir. 2012) (“[W]e accept all facts alleged in the complaint as true.“)—
2. Luis sufficiently pleaded invasion of privacy under Ohio common law
Luis‘s final argument is that he has sufficiently pleaded a claim for common-law invasion of privacy. The parties agree that Ohio recognizes the “intrusion” variant of this tort. Prevailing on an intrusion claim requires the plaintiff to show that the defendant caused a “wrongful intrusion into one‘s private activities in such a manner as to outrage or cause mental suffering, shame or humiliation to a person of ordinary sensibilities.” Welling v. Weinfeld, 113 Ohio St.3d 464, 866 N.E.2d 1051, 1053 (2007) (quoting Housh v. Peth, 165 Ohio St. 35, 133 N.E.2d 340, 343 (1956)). The plaintiff must have a “reasonable expectation of privacy” in the area or subject matter in which the alleged intrusion occurs. Retuerto v. Berea Moving Storage & Logistics, 38 N.E.3d 392, 406 (Ohio Ct. App. 2015) (internal quotation marks omitted). This expectation depends on the “totality of the circumstances.” Lazette v. Kulmatycki, 949 F.Supp.2d 748, 761 (N.D. Ohio 2013).
In the present case, Luis alleges that he began exchanging electronic communications with Catherine in February 2009. Nothing in the complaint suggests that Luis or Catherine expected other people to monitor these communications, nor does Awareness contend that any other person had a legitimate reason to access these exchanges. In addition, the complaint specifically alleges that Luis‘s “conversations and communications were private,” and that the installation of WebWatcher allowed Joseph and the other defendants to “intercept and record conversations and actions to which they would not otherwise be privy.” These allegations sufficiently establish that Luis had a reasonable expectation of privacy in his exchanges of electronic communications with Catherine. Cf. Lazette, 949 F.Supp.2d at 761 (rejecting a motion to dismiss an intrusion claim in part because the emails at issue “were highly personal and private“).
Luis next alleges that Awareness carried out the intrusion by intercepting his communications in violation of the federal and state Wiretap Acts. See Part II.D.1.a. above. Awareness‘s conduct was therefore “wrongful” for the purposes of Luis‘s intrusion claim. See LeCrone v. Ohio Bell Tel. Co., 120 Ohio App. 129, 201 N.E.2d 533, 536 (1963) (observing that the kind of conduct giving rise to an intrusion claim “generally would be criminal” or “a violation of public utility law“); see also Retuerto, 38 N.E.3d at 407 (noting that an example of conduct constituting intrusion “would be wiretapping“).
Finally, Luis alleges that learning of Awareness‘s conduct caused him “surprise and dismay.” He adds that, after intercepting his communications, Awareness disclosed “private and potentially embarrassing facts” to third parties such as Joseph. These allegations support a reasonable inference that Awareness‘s alleged intrusion caused “mental suffering, shame or humiliation.” See Welling, 866 N.E.2d at 1053. Luis therefore adequately pleaded the last remaining aspect of his common-law intrusion claim. Cf. LeCrone, 201 N.E.2d at 536 (“As a general proposition, eavesdropping on phone conversations of another by unauthorized mechanical means, or a so[-]called ‘tap,’ is the kind of act or con
The district court reached the opposite conclusion. It held that Luis had failed to state a claim against Awareness because (1) Luis‘s factual allegations were too sparse, and (2) any liability should be attributed to Joseph rather than to Awareness.
We find the district court‘s analysis unconvincing. First, as described above, Luis alleged factual content related to each element of his intrusion claim. The complaint admittedly could contain additional details, and Luis‘s intrusion claim against Awareness may yet fail, but at this point Luis need nudge his claim past only the “speculative level.” See Bell Atl. Corp. v. Twombly, 550 U.S. 544, 555, 127 S.Ct. 1955, 167 L.Ed.2d 929 (2007); see also Bassett v. Nat‘l Collegiate Athletic Ass‘n, 528 F.3d 426, 430 (6th Cir. 2008) (”Twombly does not require heightened fact pleading. . . .” (internal quotation marks omitted)). Luis, in other words, has provided enough information for a factfinder to reasonably infer that Awareness was responsible for each element of an intrusion claim. Luis‘s complaint is therefore adequate. See Kreipke v. Wayne State Univ., 807 F.3d 768, 774 (6th Cir. 2015) (noting that a complaint should “contain either direct or inferential allegations respecting all material elements necessary for recovery under a viable legal theory” (internal quotation marks omitted)).
Second, Luis‘s intrusion claim does not depend on attributing the actions of Joseph to Awareness. Rather, as previously explained, Luis alleges that Awareness itself violated the federal and state Wiretap Acts by acquiring Luis‘s communications. Awareness is therefore unable to escape Luis‘s claims simply by arguing that a different party was actually more culpable. We accordingly conclude that Luis has adequately stated an intrusion claim against Awareness.
VI. CONCLUSION
Our holdings should not be construed as foreshadowing the ultimate outcome of Luis‘s claims. Awareness may yet prevail on summary judgment or at trial. For now, however, Luis‘s claims are sufficient to survive Awareness‘s motion to dismiss. The judgment of the district court is therefore REVERSED and the case is REMANDED for further proceedings consistent with this opinion.
ALICE M. BATCHELDER, Circuit Judge, dissenting.
I agree that the complaint sufficiently alleges that WebWatcher “intercepts” communications within the meaning of the Wiretap Act, but my agreement with the majority ends there. Regarding his
Luis‘s
The majority accepts Luis‘s argument on appeal that the complaint directly implicates Awareness in paragraph 77. But this reading is much more than just charitable—it grasps at straws. In describing how WebWatcher operates, Paragraph 77 uses only a possessive pronoun that lacks any antecedent: “WebWatcher immediately and instantaneously routs the intercepted communications to their servers located in California to be stored for their subscribers to later retrieve at their leisure.” Awareness is neither named nor the subject of the action. This paragraph, located amidst Luis‘s allegations against the other defendants, does not give rise to the plausible inference that Awareness intentionally intercepted Luis‘s communications. See Ashcroft v. Iqbal, 556 U.S. 662, 682-83, 129 S.Ct. 1937, 173 L.Ed.2d 868 (2009).
Even setting aside Twombly and Iqbal‘s pleading standards (as the majority does), the main purpose of a complaint has always been “to give the defendant fair notice of what the claim is and the grounds upon which it rests.” Bell Atlantic Corp. v. Twombly, 550 U.S. 544, 555, 127 S.Ct. 1955, 167 L.Ed.2d 929 (2007) (quoting Conley v. Gibson, 355 U.S. 41, 47, 78 S.Ct. 99, 2 L.Ed.2d 80 (1957)). Luis‘s complaint fails even this lenient standard. It does not put Awareness on notice that it—the manufacturer and seller—could be liable for anonymous customer Joseph Zang‘s misuse of the WebWatcher. Luis‘s novel theory of liability does not appear even to have been tried, much less to have been successful, in any previous case. Neither Awareness nor the district court should have been expected to divine it from Luis‘s allegations against the other defendants. I would affirm the district court‘s dismissal of Luis‘s
As for Luis‘s
[A]ny person whose wire, oral, or electronic communication is intercepted, disclosed, or intentionally used in violation of this chapter may in a civil action recover from the person or entity . . . which engaged in that violation such relief as may be appropriate.
But who may be liable under this provision? As the majority correctly notes, the phrase “engaged in that violation” narrows the category of possible defendants. “[T]hat violation” plainly refers back to the earlier verb series; a proper defendant is one who “engaged in” an illegal “intercept[ion], disclos[ure], or . . . use[].” Every circuit court that has addressed the issue has so held. See DirecTV, Inc. v. Treworgy, 373 F.3d 1124, 1127 (11th Cir. 2004) (holding that
Having come this far, the majority inexplicably fails to reach the only logical conclusion: a defendant who violates only
The majority distinguishes Treworgy and Robson, which referred specifically to possession of a device, but it does not consider the other above-cited cases. See Peavy, 221 F.3d at 169 (rejecting liability for illegally procuring an illegal interception); Flowers, 773 F.2d at 589 (rejecting liability for illegal manufacture or sale). And the only supporting authority the majority can muster is an alternative holding from an out-of-circuit district court. See DirecTV, Inc. v. Tasche, 316 F.Supp.2d 783, 789 (E.D. Wis. 2004) (adopting in the first instance a broad interpretation of
Nor does the majority cogently explain why manufacturing, marketing, and selling should be treated differently from possession. Instead of addressing these violations categorically, the majority dives into the facts of this case: Awareness took an “active role.” This approach introduces two flaws.
As a factual matter, the opinion confuses Awareness‘s alleged violations of
But even setting aside this confusion, the majority‘s nebulous, fact-based analysis is hardly a reasoned way to determine whether a cause of action exists. The majority‘s holding, if prescriptive, will result in case-by-case determinations of whether this or that defendant‘s actions rose to the level of “engagement” in a
The simple alternative to this whole muddle is apparent from a straightforward reading of the statutory text. It has been adopted by every circuit to consider the issue until now. The plain meaning of
I respectfully dissent.
Beverly J. GETZ, Executrix for the Estate of Robert T. Getz, Plaintiff-Appellant, v. J. SWOAP, Wood County Sheriff‘s Office, Defendant-Appellee.
No. 15-3514
United States Court of Appeals, Sixth Circuit.
Decided and Filed: August 16, 2016
